django-restit 4.2.164__py3-none-any.whl → 4.2.166__py3-none-any.whl
Sign up to get free protection for your applications and to get access to all the features.
- account/models/device.py +7 -4
- {django_restit-4.2.164.dist-info → django_restit-4.2.166.dist-info}/METADATA +1 -1
- {django_restit-4.2.164.dist-info → django_restit-4.2.166.dist-info}/RECORD +11 -10
- incident/__init__.py +3 -0
- incident/migrations/0016_rule_notify_template.py +18 -0
- incident/models/incident.py +24 -3
- incident/models/rules.py +1 -0
- incident/rpc.py +73 -57
- rest/__init__.py +1 -1
- {django_restit-4.2.164.dist-info → django_restit-4.2.166.dist-info}/LICENSE.md +0 -0
- {django_restit-4.2.164.dist-info → django_restit-4.2.166.dist-info}/WHEEL +0 -0
account/models/device.py
CHANGED
@@ -6,6 +6,8 @@ from rest import settings
|
|
6
6
|
from objict import objict
|
7
7
|
from datetime import datetime
|
8
8
|
|
9
|
+
from rest import helpers as rh
|
10
|
+
|
9
11
|
CM_BACKENDS = objict()
|
10
12
|
DEVICE_USE_BUID = settings.get("DEVICE_USE_BUID", False)
|
11
13
|
|
@@ -85,8 +87,9 @@ class MemberDevice(models.Model, rm.RestModel, rm.MetaDataModel):
|
|
85
87
|
md.state = 1
|
86
88
|
md.touch(request.ip)
|
87
89
|
metadata = request.DATA.get("device_metadata", None)
|
88
|
-
|
89
|
-
|
90
|
+
rh.debug("md.metadata", metadata)
|
91
|
+
if metadata is not None:
|
92
|
+
md.setProperty("device", metadata)
|
90
93
|
return md
|
91
94
|
md = MemberDevice(
|
92
95
|
uuid=device_id, buid=buid,
|
@@ -100,8 +103,8 @@ class MemberDevice(models.Model, rm.RestModel, rm.MetaDataModel):
|
|
100
103
|
md.save()
|
101
104
|
md.setProperty("user_agent", request.META.get('HTTP_USER_AGENT', ''))
|
102
105
|
metadata = request.DATA.get("device_metadata", None)
|
103
|
-
if
|
104
|
-
md.
|
106
|
+
if metadata is not None:
|
107
|
+
md.setProperty("device", metadata)
|
105
108
|
return md
|
106
109
|
|
107
110
|
@classmethod
|
@@ -26,7 +26,7 @@ account/migrations/0021_alter_cloudcredentials_group.py,sha256=zoFYmE-hd3uRGX6DR
|
|
26
26
|
account/migrations/0022_alter_memberdevice_modified.py,sha256=9eeKcdr9p6qFJ8ZxSnKSj1KxZjW8NZfM0YCMck6i0QQ,424
|
27
27
|
account/migrations/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
28
28
|
account/models/__init__.py,sha256=cV_lMnT2vL_mjiYtT4hlcIHo52ocFbGSNVkOIHHLXZY,385
|
29
|
-
account/models/device.py,sha256=
|
29
|
+
account/models/device.py,sha256=8D-Sbv9PZWAnX6UVpp1lNJ03P24fknNnN1VOhqY7RVg,6306
|
30
30
|
account/models/feeds.py,sha256=vI7fG4ASY1M0Zjke24RdnfDcuWeATl_yR_25jPmT64g,2011
|
31
31
|
account/models/group.py,sha256=N9Ow7AtV4xN5zSE9E5-msthJy0G5-3DEr2MTmvFO1kU,22887
|
32
32
|
account/models/legacy.py,sha256=zYdtv4LC0ooxPVqWM-uToPwV-lYWQLorSE6p6yn1xDw,2720
|
@@ -95,7 +95,7 @@ inbox/utils/parsing.py,sha256=y_71dwz8bm3JvF35ol8698XJ36sBF8fQWUrn0sYd2Fs,5597
|
|
95
95
|
inbox/utils/render.py,sha256=CU_F2qUBQE7mjb9Q6Dn9ro5CS_O_zEY-wDMHEClKkIA,4331
|
96
96
|
inbox/utils/sending.py,sha256=BKelTZnbkdSLGpjOY6IRTrzj-Hnw2pPZ7RYQGwe-tqk,2179
|
97
97
|
incident/README.md,sha256=4vbZTJj7uUmq8rogYngxqNYjFTlBOujfWUGheLoFKMc,1114
|
98
|
-
incident/__init__.py,sha256=
|
98
|
+
incident/__init__.py,sha256=FXNMmcGP6YAKjwik84ppze33uL0kDTa7YFr3aOEXhhk,3658
|
99
99
|
incident/migrations/0001_initial.py,sha256=KmJRau3a2QFRaUwUrFUgY2p7FQZCODv3F-Sl0ZArpu0,9720
|
100
100
|
incident/migrations/0002_event_component_event_component_id.py,sha256=Qfu3ndJKh4v7953ULTUZlSa3mVI-lnFIq9VFN1Rbs7Q,595
|
101
101
|
incident/migrations/0003_rule_action.py,sha256=LNqV52qOjxxe3L8qEdln-Hd2voFcpyjOZ_cEsasrv7s,425
|
@@ -111,17 +111,18 @@ incident/migrations/0012_rule_match_by.py,sha256=PGclGnnc_8JEsJZ8znoXm-iAC6Y0i2W
|
|
111
111
|
incident/migrations/0013_rulecheck_is_required.py,sha256=cL7tOj5XGPpKd2f5BojIKfNJeDB1IL-jGRU6-g-Co5o,387
|
112
112
|
incident/migrations/0014_event_group_alter_rulecheck_index.py,sha256=v3gm5k0LVoas27qUDOt7el7YtK4yjFVLeEpuFUCoXaQ,724
|
113
113
|
incident/migrations/0015_rule_title_template_alter_incident_state.py,sha256=FPUDhFwqBC39EjeknRT7BPddEf6ExCjsXVb9LMqIn3U,687
|
114
|
+
incident/migrations/0016_rule_notify_template.py,sha256=4WGdMxiELujLIy9bzHovHWbAORupodN1Ty3vsy3mLjg,425
|
114
115
|
incident/migrations/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
115
116
|
incident/models/__init__.py,sha256=NMphuhb0RTMf7Ov4QkNv7iv6_I8Wtr3xQ54yjX_a31M,209
|
116
117
|
incident/models/event.py,sha256=FEzEKKQKLkdRrPCvv-3Um9E2UPQjyIJp314Zr2LHuiw,7976
|
117
|
-
incident/models/incident.py,sha256=
|
118
|
+
incident/models/incident.py,sha256=dSveWs0VawYePeFxwZT8ni85CS_4jxpGV8nXPVGXokk,22607
|
118
119
|
incident/models/ossec.py,sha256=eUDRGawzuLWobKEVGKfdZisDnyjS_Hlxi0T_GCSLCCI,2252
|
119
|
-
incident/models/rules.py,sha256=
|
120
|
+
incident/models/rules.py,sha256=PPp8oJDW1gop9i_21lhP50qgt_TrdWErp2mYqZCMfd4,7065
|
120
121
|
incident/models/ticket.py,sha256=S3kqGQpYLE6Y4M9IKu_60sgW-f592xNr8uufqHnvDoU,2302
|
121
122
|
incident/parsers/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
122
123
|
incident/parsers/ossec.py,sha256=fouUsSnrdkEuqDzJ-MxmCP7ny5pCGFS3Tyf6lQSMBc4,11609
|
123
124
|
incident/periodic.py,sha256=eX1rQK6v65A9ugofTvJPSmAWei6C-3EYgzCMuGZ03jM,381
|
124
|
-
incident/rpc.py,sha256=
|
125
|
+
incident/rpc.py,sha256=y1u_op8PiWI4kUVD_DsKXmygdxRDBDxudCFGp829s3E,9056
|
125
126
|
incident/templates/email/incident_change.html,sha256=tQYphypwLukkVdwH0TB2Szz2VEJ7GnsfRS3_ZJ-MYeE,13895
|
126
127
|
incident/templates/email/incident_msg.html,sha256=MZdKhTddUF2MpiH8Z3RTQEmW_ko1n3ajeZ11KLtiLlU,13780
|
127
128
|
incident/templates/email/incident_new.html,sha256=W6nwFQROnyDfMlXub8s02ws4hGnJp16pfgp9xTm_aEc,15185
|
@@ -378,7 +379,7 @@ pushit/utils.py,sha256=IeTCGa-164nmB1jIsK1lu1O1QzUhS3BKfuXHGjCW-ck,2121
|
|
378
379
|
rest/.gitignore,sha256=TbEvWRMnAiajCTOdhiNrd9eeCAaIjRp9PRjE_VkMM5g,118
|
379
380
|
rest/README.md,sha256=V3ETc-cJu8PZIbKr9xSe_pA4JEUpC8Dhw4bQeVCDJPw,5460
|
380
381
|
rest/RemoteEvents.py,sha256=nL46U7AuxIrlw2JunphR1tsXyqi-ep_gD9CYGpYbNgE,72
|
381
|
-
rest/__init__.py,sha256=
|
382
|
+
rest/__init__.py,sha256=0TxtckfR2izNmII4ddcJuIksqIVi3UW_LKZ9O-p_E4E,122
|
382
383
|
rest/arc4.py,sha256=y644IbF1ec--e4cUJ3KEYsewTCITK0gmlwa5mJruFC0,1967
|
383
384
|
rest/cache.py,sha256=1Qg0rkaCJCaVP0-l5hZg2CIblTdeBSlj_0fP6vlKUpU,83
|
384
385
|
rest/crypto/__init__.py,sha256=Tl0U11rgj1eBYqd6OXJ2_XSdNLumW_JkBZnaJqI6Ldw,72
|
@@ -514,7 +515,7 @@ ws4redis/servers/uwsgi.py,sha256=VyhoCI1DnVFqBiJYHoxqn5Idlf6uJPHvfBKgkjs34mo,172
|
|
514
515
|
ws4redis/settings.py,sha256=KKq00EwoGnz1yLwCZr5Dfoq2izivmAdsNEEM4EhZwN4,1610
|
515
516
|
ws4redis/utf8validator.py,sha256=S0OlfjeGRP75aO6CzZsF4oTjRQAgR17OWE9rgZdMBZA,5122
|
516
517
|
ws4redis/websocket.py,sha256=R0TUyPsoVRD7Y_oU7w2I6NL4fPwiz5Vl94-fUkZgLHA,14848
|
517
|
-
django_restit-4.2.
|
518
|
-
django_restit-4.2.
|
519
|
-
django_restit-4.2.
|
520
|
-
django_restit-4.2.
|
518
|
+
django_restit-4.2.166.dist-info/LICENSE.md,sha256=VHN4hhEeVOoFjtG-5fVv4jesA4SWi0Z-KgOzzN6a1ps,1068
|
519
|
+
django_restit-4.2.166.dist-info/METADATA,sha256=UFrfXKJj92wJ-lgCMNHKLGE8dsK9hP9MKncpiq9O-jE,7663
|
520
|
+
django_restit-4.2.166.dist-info/WHEEL,sha256=sP946D7jFCHeNz5Iq4fL4Lu-PrWrFsgfLXbbkciIZwg,88
|
521
|
+
django_restit-4.2.166.dist-info/RECORD,,
|
incident/__init__.py
CHANGED
@@ -15,6 +15,9 @@ def _request_to_meta(request, metadata):
|
|
15
15
|
metadata["buid"] = request.buid
|
16
16
|
if "username" not in metadata and hasattr(request, "member") and request.member is not None:
|
17
17
|
metadata["username"] = request.member.username
|
18
|
+
# if "group_name" not in metadata and hasattr(request, "group") and request.group is not None:
|
19
|
+
# metadata['group_name'] = request.group.name
|
20
|
+
# metadata['group_id'] = request.group.id
|
18
21
|
return metadata
|
19
22
|
|
20
23
|
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Generated by Django 4.2.11 on 2025-01-03 19:20
|
2
|
+
|
3
|
+
from django.db import migrations, models
|
4
|
+
|
5
|
+
|
6
|
+
class Migration(migrations.Migration):
|
7
|
+
|
8
|
+
dependencies = [
|
9
|
+
('incident', '0015_rule_title_template_alter_incident_state'),
|
10
|
+
]
|
11
|
+
|
12
|
+
operations = [
|
13
|
+
migrations.AddField(
|
14
|
+
model_name='rule',
|
15
|
+
name='notify_template',
|
16
|
+
field=models.TextField(default=None, null=True),
|
17
|
+
),
|
18
|
+
]
|
incident/models/incident.py
CHANGED
@@ -280,9 +280,7 @@ class Incident(models.Model, rm.RestModel, rm.MetaDataModel):
|
|
280
280
|
try:
|
281
281
|
action, perm = self.rule.action.split(":")
|
282
282
|
members = Member.GetWithNotification(perm)
|
283
|
-
|
284
|
-
url = F"{settings.INCIDENT_PORTAL_URL}?incident={self.pk}"
|
285
|
-
msg = f"Incident #{self.pk}\n{self.description}\n{url}"
|
283
|
+
msg = self.renderTemplate()
|
286
284
|
for m in members:
|
287
285
|
m.sendSMS(msg)
|
288
286
|
except Exception:
|
@@ -363,6 +361,29 @@ class Incident(models.Model, rm.RestModel, rm.MetaDataModel):
|
|
363
361
|
context=dict(incident=self, portal_url=settings.INCIDENT_PORTAL_URL),
|
364
362
|
email_only=True, from_email=INCIDENT_EMAIL_FROM)
|
365
363
|
|
364
|
+
def renderTemplate(self):
|
365
|
+
has_template = self.rule and self.rule.notify_template and not self.rule.notify_template.startswith("http")
|
366
|
+
url = self.renderURL()
|
367
|
+
if not has_template:
|
368
|
+
return f"Incident #{self.pk}\n{self.description}\n{url}"
|
369
|
+
template = self.rule.notify_template
|
370
|
+
try:
|
371
|
+
template = template.format(event=self)
|
372
|
+
except Exception:
|
373
|
+
pass
|
374
|
+
return template
|
375
|
+
|
376
|
+
def renderURL(self):
|
377
|
+
has_template = self.rule and self.rule.notify_template and self.rule.notify_template.startswith("http")
|
378
|
+
if not has_template:
|
379
|
+
return F"{settings.INCIDENT_PORTAL_URL}?incident={self.pk}"
|
380
|
+
url = self.rule.notify_template
|
381
|
+
try:
|
382
|
+
url = url.format(event=self)
|
383
|
+
except Exception:
|
384
|
+
pass
|
385
|
+
return url
|
386
|
+
|
366
387
|
def lastSentAge(self):
|
367
388
|
# prevent spams, only allow emails every 5 minutes
|
368
389
|
if self.action_sent is None:
|
incident/models/rules.py
CHANGED
@@ -65,6 +65,7 @@ class Rule(models.Model, rm.RestModel):
|
|
65
65
|
|
66
66
|
name = models.CharField(max_length=200)
|
67
67
|
title_template = models.CharField(max_length=200, default=None, null=True)
|
68
|
+
notify_template = models.TextField(default=None, null=True)
|
68
69
|
# the group the rule gets assigned to when triggered
|
69
70
|
group = models.ForeignKey("account.Group", on_delete=models.CASCADE, null=True, default=None)
|
70
71
|
# category allows us to limit running rules to only those with a category
|
incident/rpc.py
CHANGED
@@ -56,69 +56,85 @@ if settings.REPORT_PERMISSION_DENIED:
|
|
56
56
|
rv.restPermissionDenied = patched_restPermissionDenied
|
57
57
|
|
58
58
|
|
59
|
+
@rd.urlPOST(r'^ossec/alert/batch$')
|
60
|
+
def batch_ossec_alert_creat_from_request(request):
|
61
|
+
batch = request.DATA.get("batch")
|
62
|
+
if not isinstance(batch, list):
|
63
|
+
return rv.restStatus(request, False, error="invalid format")
|
64
|
+
for alert in batch:
|
65
|
+
on_ossec_alert(request, alert)
|
66
|
+
return rv.restStatus(request, True)
|
67
|
+
|
68
|
+
|
59
69
|
@rd.urlPOST(r'^ossec/alert$')
|
60
70
|
def ossec_alert_creat_from_request(request):
|
61
71
|
payload = request.DATA.get("payload")
|
62
|
-
if payload:
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
|
86
|
-
|
87
|
-
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
96
|
-
|
97
|
-
|
98
|
-
|
99
|
-
|
100
|
-
|
101
|
-
|
102
|
-
|
103
|
-
"component": "incident.ServerOssecAlert",
|
104
|
-
"component_id": od.id,
|
105
|
-
"reporter_ip": od.src_ip,
|
106
|
-
"metadata": metadata
|
107
|
-
})
|
108
|
-
return rv.restStatus(request, True)
|
109
|
-
except Exception as err:
|
110
|
-
rh.log_exception()
|
111
|
-
stack = rh.getStackString()
|
112
|
-
# rh.log_exception("during ossec alert", payload)
|
113
|
-
metadata = dict(ip=request.ip, payload=payload)
|
72
|
+
if not payload:
|
73
|
+
return rv.restStatus(request, False, error="no alert data")
|
74
|
+
on_ossec_alert(request, payload)
|
75
|
+
return rv.restStatus(request, True)
|
76
|
+
|
77
|
+
|
78
|
+
def on_ossec_alert(request, alert):
|
79
|
+
try:
|
80
|
+
# TODO make this a task (background it)
|
81
|
+
# rh.log_error("parsing payload", payload)
|
82
|
+
od = ossec.parseAlert(request, alert)
|
83
|
+
# lets now create a local event
|
84
|
+
if od is not None:
|
85
|
+
level = 10
|
86
|
+
if od.level > 10:
|
87
|
+
level = 1
|
88
|
+
elif od.level > 7:
|
89
|
+
level = 2
|
90
|
+
elif od.level == 6:
|
91
|
+
level = 3
|
92
|
+
elif od.level == 5:
|
93
|
+
level = 4
|
94
|
+
elif od.level == 4:
|
95
|
+
level = 6
|
96
|
+
elif od.level <= 3:
|
97
|
+
level = 8
|
98
|
+
metadata = od.toDict(graph="default")
|
99
|
+
metadata.update(od.metadata)
|
100
|
+
# we reuse the ssh_sig because it is a text field to store urls
|
101
|
+
# ssh_sig = metadata.get("ssh_sig", None)
|
102
|
+
# if ssh_sig is not None and ssh_sig.startswith("http"):
|
103
|
+
# metadata["url"] = ssh_sig
|
104
|
+
# metadata["domain"] = ossec.extractDomain(ssh_sig)
|
105
|
+
# metadata["path"] = ossec.extractUrlPath(ssh_sig)
|
106
|
+
# metadata.pop("ssh_sig")
|
107
|
+
if od.geoip:
|
108
|
+
metadata["country"] = od.geoip.country
|
109
|
+
metadata["city"] = od.geoip.city
|
110
|
+
metadata["province"] = od.geoip.state
|
111
|
+
metadata["isp"] = od.geoip.isp
|
112
|
+
|
114
113
|
am.Event.createFromDict(None, {
|
115
|
-
"hostname":
|
116
|
-
"description":
|
117
|
-
"details":
|
118
|
-
"level":
|
119
|
-
"category": "
|
114
|
+
"hostname": od.hostname,
|
115
|
+
"description": od.title,
|
116
|
+
"details": od.text,
|
117
|
+
"level": level,
|
118
|
+
"category": "ossec",
|
119
|
+
"component": "incident.ServerOssecAlert",
|
120
|
+
"component_id": od.id,
|
121
|
+
"reporter_ip": od.src_ip,
|
120
122
|
"metadata": metadata
|
121
123
|
})
|
124
|
+
return rv.restStatus(request, True)
|
125
|
+
except Exception as err:
|
126
|
+
rh.log_exception()
|
127
|
+
stack = rh.getStackString()
|
128
|
+
# rh.log_exception("during ossec alert", payload)
|
129
|
+
metadata = dict(ip=request.ip, payload=alert)
|
130
|
+
am.Event.createFromDict(None, {
|
131
|
+
"hostname": request.get_host(),
|
132
|
+
"description": f"error parseing alert: {err}",
|
133
|
+
"details": stack,
|
134
|
+
"level": 8,
|
135
|
+
"category": "ossec_error",
|
136
|
+
"metadata": metadata
|
137
|
+
})
|
122
138
|
# rh.log_error("ossec alert", request.DATA.asDict())
|
123
139
|
return rv.restStatus(request, False, error="no alert data")
|
124
140
|
|
rest/__init__.py
CHANGED
File without changes
|
File without changes
|